A method and apparatus for suppressing a duplicated alarm in a communications network are described. In one embodiment, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
|
1. A method for suppressing a duplicated alarm in a communications network, comprising:
receiving at least one alarm message associated with at least one event;
determining if said at least one event exists in a database; and
recording said at least one event in said database if said at least one event does not exist in said database, or suppressing said at least one alarm message if said at least one event exists in said database.
15. An apparatus for suppressing a duplicated alarm in a communications network, comprising:
means for receiving at least one alarm message associated with at least one event;
means for determining if said at least one event exists in a database; and
means for recording said at least one event in said database if said at least one event does not exist in said database, or for suppressing said at least one alarm message if said at least one event exists in said database.
8. A computer readable medium having stored thereon a plurality of instructions, the plurality of instructions including instructions which, when executed by a processor, causes the processor to perform the steps of a method for suppressing a duplicated alarm in a communications network, comprising:
receiving at least one alarm message associated with at least one event;
determining if said at least one event exists in a database; and
recording said at least one event in said database if said at least one event does not exist in said database, or suppressing said at least one alarm message if said at least one event exists in said database.
2. The method of
3. The method of
forwarding said at least one alarm message to a central management console after said at least one event is recorded in said database.
4. The method of
5. The method of
6. The method of
deleting said at least one event from said database upon an expiration of a predefined time period.
7. The method of
10. The computer readable medium of
forwarding said at least one alarm message to a central management console after said at least one event is recorded in said database.
11. The computer readable medium of
12. The computer readable medium of
13. The computer readable medium of
deleting said at least one event from said database upon an expiration of a predefined time period.
14. The computer readable medium of
16. The apparatus of
17. The apparatus of
means for forwarding said at least one alarm message to a central management console after said at least one event is recorded in said database.
18. The apparatus of
19. The apparatus of
20. The apparatus of
means for deleting said at least one event from said database upon an expiration of a predefined time period.
|
1. Field of the Invention
Embodiments of the present invention generally relate to anomaly detection systems and, more particularly, to a method and apparatus for suppressing duplicate alarms in a communications network, such as an enterprise environment.
2. Description of the Related Art
Presently, the volume of detected security events within an enterprise environment network can produce an overwhelming quantity of alarms. However, a significant portion of these alarms are recurring duplicates. Therefore, these duplicate alarm messages need to be intelligently suppressed from being processed and/or displayed at a central management console. Failure to do so may create a denial of service condition against a cyber security team, or alternatively overwhelm a network operator viewing a monitoring display. For example, during the outbreak of a cyber security event such as a virus or worm, the number of alarms may be excessive and can overwhelm a cyber security team. Similarly, many commercial system vendors often provide scrolling windows to receive and view the flow of alarm messages. Some vendors provide “freeze” and “continue” buttons to halt the scrolling alarms so they can be examined. However, these solutions are not completely effective because the duplicated alarms make it difficult for other alarm messages to be discerned.
Thus, there is a need in the art for a method and apparatus for suppressing duplicate alarms.
In one embodiment, a method and apparatus for suppressing a duplicated alarm in a communications network are described. Specifically, at least one alarm message associated with at least one event is received. A determination of whether the at least one event exists in a database (or in a memory state table) is subsequently made. The at least one event is recorded in the database if the at least one event does not exist in the database. Conversely, the at least one alarm message is suppressed if the at least one event exists in the database.
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
To better understand the present invention,
In one embodiment, the SIM environment 100 comprises a customer network layer that comprises a plurality of devices 1021 . . . n that are configured for collecting log information. In one embodiment, the log information is made up of log files that record the transactions (e.g., requests, scans, inquiries, and other access actions made by other computers) involving the collection devices 1021 . . . n. Specifically, these devices 1021 . . . n may comprise network devices or security devices such as honeypots, tarpits, routers, proxies, IDSs, firewalls, e-mail servers, and the like. The log information produced by the devices 1021 . . . n is ultimately acquired by a collection of parsers 1041 . . . m. The parsers 104, which may be located in at least one network server, are responsible for standardizing the log information collected from the network and security devices 1021 . . . n. Specifically, the log information generated by the different devices may vary in form. The parsers 104 are able to process the different types of log information and convert all of the data into a homogenous and standard form.
The first “correlation” layer of the SIM system 100 comprises of a plurality of event consolidators (ECs) 1061 . . . p. The ECs 106 receive the standardized log information from the parsers 104 and initially perform normalization procedures. The normalization procedures may include timing normalization, classification normalization (i.e., assigning common names to common types of log information), and the like. Afterwards, the ECs conduct brief, near real-time alarming measures. The ECs 1061 . . . p are initially provisioned with a set of security event detection rules that use state tables to “remember” instances of activities that can be used to detect suspicious or anomalous activity over a short period of time (e.g., a computer that accesses 100 IP ports on 100 different computers in a span of 5 minutes). An EC is limited to the number of objects (e.g., 15,000 objects) that can be held in a state table. Upon detecting an abnormal activity using the security event detection rules, an EC 106 will generate an alarm message that is provided to a global correlator 114. In one embodiment, each of the ECs is designated to service a particular geographical region.
The global correlator (GC) 114 is a network element that is responsible for receiving the alarms from the “regional” ECs 1061 . . . p. Notably, the GC 114 is still limited to a predefined number of objects (e.g., 15,000 objects) in a state table as well as conducting near real-time alarming over a short period of time (e.g., inspecting log information for suspicious activity in 30 second intervals). The GC 114 is also configured to consolidate and correlate all of the received alarms and provide them to a central management console (CMC) 116. The CMC 116 may comprise a cyber command console or portal that enables a network operator to view and analyze incoming alarms.
In one embodiment of the present invention, the global correlator (GC) 114 contains an alarm de-duplication module 118. The alarm de-duplication module (ADM) 118 is configured to perform an alarm suppression process to reduce the number of redundant alarms forwarded to the CMC 116. Specifically, the ADM 118 evaluates each alarm message being sent to the CMC 116 (via the GC 114) to determine whether the alarm message is new or if it is a duplicate of a previously sent message. An alarm message may be considered duplicate if an event is identical to another event with respect to similar attributes. For example, if the event is characterized by the same alarm name, source IP (SIP) address, the same destination IP (DIP) address, the same source port, the same destination port, and the same protocol, then the event is considered a duplicate by the ADM 118. Notably, the attributes of an identical event are configurable (i.e., a duplicate event may be defined by more or less predefined attributes) by a network operator. Other attributes that may be used to define an event include, but are not limited to, bytes per packet ration (BPR), icmp type, code type, source hostname, TCP flag, and the like.
In one embodiment, the ADM 118 performs the alarm suppression process by using state based rules. The rules are used to create a state based hash table (in a local database 119) based on certain attributes or keys. Notably, a network operator may configure the ADM 118 to consider any number of predefined attributes. The attributes are used to identify the keys that define a duplicate event. These keys need to be unique enough to specify only the events of interest without suppressing other alarms that are not considered duplicates. The attributes that are selected as the unique identification keys are entered into the rules system by the operator.
Upon receiving an alarm from the ECs 1061 . . . p, the ADM 118 inspects the associated event and attempts to place the event into a hash table. Specifically, when an alarm message is received, the hash table is examined to determine if an event with the same hash keys is present. If there is an identical entry already in this state based hash table, the event is not forwarded up to the management console at the CMC 116. If there is not an entry in the state based hash table, the hash table is updated with this new event and the associated alarm is forwarded to the CMC 116. The hash is maintained on a temporal basis that is configurable by a network operator. Items in the hash table that have exceeded a predefined retention period (which is configurable by a network operator) are removed.
For example, the hash table may be configured to maintain entries for up to 24 hours. Upon placing a new entry into the hash table, the ADM 118 dates and time stamps the entry. Any similar alarm received (and compared to the hash table) by the GC 114 during the predefined 24 hour period following the time stamp is suppressed and not forwarded to the CMC 116. Therefore, the network operator (e.g., a system analyst) that is responsible for monitoring alarms at the CMC 116 is not presented with the redundant alarm. After the 24 hour period has lapsed, the expired entry is removed from the hash table. Any similar alarm (to the recently deleted entry) that is subsequently received at the GC 114 is recorded in the hash table and is ultimately forwarded to the CMC 116. This effectively notifies the network operator that the problem generating the alarms has yet to be resolved.
At step 206, a determination of whether an event associated with a received alarm message resides as an entry in a local database 119 is made. In one embodiment, the GC 114 compares each event associated with a received alarm message (from step 204) entries in a hash table. If the event is found to already exist as an entry in the hash table, the method 200 proceeds to step 212 where the received alarm message is suppressed (e.g., ignored). If the event is not found to exist in the hash table, then the method 200 continues to step 208.
At step 208, the database is updated with the event entry. In one embodiment, the GC 114 stores the new event associates with the received alarm message in the appropriate entry of the hash table. The alarm message's time of receipt (e.g., date and time stamp) is also stored with the event entry.
At step 210, the alarm message is displayed on a portal. In one embodiment, a single instance of a duplicated alarm message (i.e., the alarm message associated with the event entry stored in the database) is provided to and displayed on a network operator's display screen. By limiting the number of alarm messages that can be displayed, the user at the CMC 116 is less likely to be overwhelmed. The method 200 ends at step 214.
It should be noted that the present invention can be implemented in software and/or in a combination of software and hardware, e.g., using application specific integrated circuits (ASICs), a general purpose computer or any other hardware equivalents. In one embodiment, the present module or process 305 for suppressing duplicate alarms can be loaded into memory 304 and executed by processor 302 to implement the functions as discussed above. As such, the present process 305 for suppressing duplicate alarms (including associated data structures) of the present invention can be stored on a computer readable medium or carrier, e.g., RAM memory, magnetic or optical drive or diskette and the like.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Singer, Michael, Sheleheda, Daniel
Patent | Priority | Assignee | Title |
10268489, | Sep 20 2016 | International Business Machines Corporation | Adaptive successive warning message handling |
11093562, | Aug 04 2014 | ENT SERVICES DEVELOPMENT CORPORATION LP | Event stream processing |
7788201, | Sep 29 2006 | LinkedIn Corporation | Method, system, and program product for dispatching an event to a rule using key-value pair |
7904456, | Sep 01 2006 | Security monitoring tool for computer network | |
7930746, | Dec 29 2005 | ServiceNow, Inc | Method and apparatus for detecting anomalous network activities |
8248227, | Dec 29 2005 | ServiceNow, Inc | Method and apparatus for suppressing duplicate alarms |
8264339, | Jan 31 2008 | Yokogawa Electric Corporation | Alarm management apparatus |
8643485, | Dec 29 2005 | ServiceNow, Inc | Method and apparatus for suppressing duplicate alarms |
8976018, | Mar 29 2011 | Smile Technology Co., Ltd. | Local detection processing device and system |
9286784, | Dec 29 2005 | ServiceNow, Inc | Method and apparatus for suppressing duplicate alarms |
9325588, | Dec 25 2007 | NetApp, Inc. | Event suppression method and system |
9678820, | Jun 29 2015 | VMware LLC | Alerting with duplicate suppression |
Patent | Priority | Assignee | Title |
6356282, | Dec 04 1998 | Oracle America, Inc | Alarm manager system for distributed network management system |
6513129, | Jun 30 1999 | OBJECTIVE SYSTEMS INTEGRATORS, INC | System and method for managing faults using a gateway |
6748432, | Jun 16 2000 | Cisco Technology, Inc | System and method for suppressing side-effect alarms in heterogenoeus integrated wide area data and telecommunication networks |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 29 2005 | AT&T Corp. | (assignment on the face of the patent) | / | |||
May 15 2006 | SHELEHEDA, DANIEL | AT & T Corp | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017753 | /0398 | |
May 15 2006 | SINGER, MICHAEL | AT & T Corp | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017753 | /0398 | |
Nov 14 2017 | AT&T Corp | AT&T Properties, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044190 | /0824 | |
Nov 14 2017 | AT&T Properties, LLC | AT&T INTELLECTUAL PROPERTY II, L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044200 | /0303 | |
Dec 14 2017 | AT&T INTELLECTUAL PROPERTY II, L P | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044603 | /0008 | |
Jun 25 2024 | DH2I COMPANY | MICHAEL C MARTENSEN P C | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 067828 | /0207 | |
Aug 12 2024 | MICHAEL C MARTENSEN P C | DH2I COMPANY | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 068252 | /0515 |
Date | Maintenance Fee Events |
Jan 27 2012 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jan 25 2016 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 30 2020 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Aug 05 2011 | 4 years fee payment window open |
Feb 05 2012 | 6 months grace period start (w surcharge) |
Aug 05 2012 | patent expiry (for year 4) |
Aug 05 2014 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 05 2015 | 8 years fee payment window open |
Feb 05 2016 | 6 months grace period start (w surcharge) |
Aug 05 2016 | patent expiry (for year 8) |
Aug 05 2018 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 05 2019 | 12 years fee payment window open |
Feb 05 2020 | 6 months grace period start (w surcharge) |
Aug 05 2020 | patent expiry (for year 12) |
Aug 05 2022 | 2 years to revive unintentionally abandoned end. (for year 12) |